Skip to main content
Internet Archive's 25th Anniversary Logo

Shmoocon 2010

ShmooCon is an American hacker convention organized by The Shmoo Group. There are typically 40 different talks and presentations on a variety of subjects related to computer security and cyberculture. Multiple events are held at the convention related to cryptography and computer security such as Shmooganography, Hack Fortress, a locksport village hosted by TOOOL DC, and Ghost in the Shellcode.



rss RSS

36
RESULTS


Show sorted alphabetically

Show sorted alphabetically

SHOW DETAILS
up-solid down-solid
eye
Title
Date Archived
Creator
Shmoocon 2010
movies

eye 42

favorite 0

comment 0

Tales From The Crypto
Shmoocon 2010
movies

eye 34

favorite 0

comment 0

Better Approaches To Physical Tamper Detection
Shmoocon 2010
movies

eye 103

favorite 0

comment 0

Ring 1 Vs Ring 2
Shmoocon 2010
movies

eye 37

favorite 0

comment 0

JSunPack Network
Shmoocon 2010
movies

eye 50

favorite 0

comment 0

Cyborg Information Security
Shmoocon 2010
movies

eye 29

favorite 0

comment 0

Blackberry Mobile Spyware
Shmoocon 2010
movies

eye 165

favorite 0

comment 0

Bluetooth Keystrokes
Shmoocon 2010
by Tom Eston, Kevin Johnson, Robin Wood
movies

eye 67

favorite 0

comment 0

In Social Zombies II: Your Friends Need More Brains, Tom Eston, Kevin Johnson and Robin Wood continue the Zombie invasion from "Social Zombies: Your Friends want to eat Your Brains" presented at DEFCON 17. This presentation will further examine the risks of social networks and then present new techniques and tools that can be used to exploit these issues. This presentation begins by discussing new twists on existing privacy concerns that are caused by the trust mass that is social...
Shmoocon 2010
movies

eye 39

favorite 0

comment 0

Keynote
Shmoocon 2010
movies

eye 95

favorite 0

comment 0

DiY Hard Drive Diagnostics
Shmoocon 2010
movies

eye 40

favorite 0

comment 0

Info Disclosure Via P2P
Shmoocon 2010
movies

eye 42

favorite 0

comment 0

How To Be An RSol
Shmoocon 2010
movies

eye 46

favorite 0

comment 0

Infrastructual Weaknesses In Distrib Wireless Comms
Shmoocon 2010
movies

eye 51

favorite 0

comment 0

Pulling The Plug
Shmoocon 2010
movies

eye 36

favorite 0

comment 0

GSM Srsly
Shmoocon 2010
movies

eye 33

favorite 0

comment 0

Windows File Pseudonyms
Shmoocon 2010
movies

eye 28

favorite 0

comment 0

0wn The Con
Shmoocon 2010
movies

eye 81

favorite 0

comment 0

Build Your Own Predator
Shmoocon 2010
movies

eye 36

favorite 0

comment 0

Flying Instruments Only
Shmoocon 2010
movies

eye 22

favorite 0

comment 0

Recoving Info From VMs & Hyperr Environments
Shmoocon 2010
movies

eye 21

favorite 0

comment 0

Closing
Shmoocon 2010
movies

eye 46

favorite 0

comment 0

De Gustibus
Shmoocon 2010
by Navas, K - Cadet, US Military Academy, Brasefield, D - Cadet, US Military Academy, Grunzweig, N - Cadet, US Military Academy, OConnor, T - Faculty Advisor, US Military Academy
movies

eye 44

favorite 0

comment 0

This talk will discuss an implementation of a honeyclient framework for mobile devices. In wireless environments, honeypots typically mimic access points or a single protocol of a device. The authors implemented a framework that can simultaneously imitate the WiFi, Bluetooth, and GPS behavior of multiple instances of different devices. This talk focuses on the challenges associated with accurately pretending to be somebody you are not and how honeyclients can contribute to the future of mobile...
Shmoocon 2010
movies

eye 34

favorite 0

comment 0

Learning By Breaking
Shmoocon 2010
movies

eye 58

favorite 0

comment 0

Guest Stealing The Vmware Way
Shmoocon 2010
movies

eye 27

favorite 0

comment 0

BaSO4
Shmoocon 2010
movies

eye 32

favorite 0

comment 0

WLCCP Analysis Of Potentially Flawed Protocol
Shmoocon 2010
movies

eye 41

favorite 0

comment 0

The Current State Of Computer Security
Shmoocon 2010
movies

eye 42

favorite 0

comment 0

Detecting Rogue APs Using Clock Skews
Shmoocon 2010
movies

eye 64

favorite 0

comment 0

Back To The Glass House
Shmoocon 2010
by Kingtuna and TheX1le
movies

eye 67

favorite 0

comment 0

Wireless de-authentication and disassociation are nothing new. The problem with it stems from the fact that tools are either too limited in scope IE... aireplay-ng or way to broad and no discriminating IE.... Mdk3. Enter Airdrop-ng. Taking the best from each and built around a solid rule parser you can preform both a very targeted attack or unleash the packets from hell and rain down packets of death on the wireless networks of the world. Airdrop-ng is more then just a deauth tool its a client...
Shmoocon 2010
movies

eye 38

favorite 0

comment 0

The Friendly Traitor
Shmoocon 2010
movies

eye 72

favorite 0

comment 0

GPU Vs CPU Supercomputing Shootout
Shmoocon 2010
movies

eye 21

favorite 0

comment 0

Splendiferous Story
Shmoocon 2010
movies

eye 39

favorite 0

comment 0

The New World Of Smartphone Security
Shmoocon 2010
movies

eye 44

favorite 0

comment 0

Cracking The Foundation